Updated kernel packages are now available as part of ongoing
support and maintenance of Red Hat Enterprise Linux version
3. This is the first regular update.
|
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ---------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 1
Advisory ID: RHSA-2004:017-01
Issue date: 2004-01-13
Updated on: 2004-01-13
Product: Red Hat Enterprise Linux
Keywords: taroon kernel update
Cross references:
Obsoletes: RHBA-2003:308 RHSA-2003:416
CVE Names: CAN-2004-0001
- ---------------------------------------------------------------------
1. Topic:
Updated kernel packages are now available as part of ongoing
support and maintenance of Red Hat Enterprise Linux version
3. This is the first regular update.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 3 - athlon, i386, i686, ia64, ppc64, ppc64iseries, ppc64pseries, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 3 - athlon, i386, i686
Red Hat Enterprise Linux WS version 3 - athlon, i386, i686, ia64, x86_64
3. Problem description:
The Linux kernel handles the basic functions of the operating
system.
This is the first regular kernel update for Red Hat Enterprise
Linux version 3. It contains a new critical security fix, many
other bug fixes, several device driver updates, and numerous
performance and scalability enhancements.
On AMD64 systems, a fix was made to the eflags checking in
32-bit ptrace emulation that could have allowed local users
to elevate their privileges. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name
CAN-2004-0001 to this issue.
Other bug fixes were made in the following kernel areas:
VM, NPTL, IPC, kernel timer, ext3, NFS, netdump, SCSI,
ACPI, several device drivers, and machine-dependent
support for the x86_64, ppc64, and s390 architectures.
The VM subsystem was improved to better handle extreme
loads and resource contention (such as might occur during
heavy database application usage). This has resulted in
a significantly reduced possibility of hangs, OOM kills,
and low-mem exhaustion.
Several NPTL fixes were made to resolve POSIX compliance
issues concerning process IDs and thread IDs. A section
in the Release Notes elaborates on a related issue with
file record locking in multi-threaded applications.
AMD64 kernels are now configured with NUMA support,
S390 kernels now have CONFIG_BLK_STATS enabled, and
DMA capability was restored in the IA64 agpgart driver.
The following drivers have been upgraded to new versions:
cmpci ------ 6.36
e100 ------- 2.3.30-k1
e1000 ------ 5.2.20-k1
ips -------- 6.10.52
megaraid --- v1.18k
megaraid2 -- v2.00.9
All Red Hat Enterprise Linux 3 users are advised to upgrade
their kernels to the packages associated with their machine
architectures and configurations as listed in this erratum.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
If up2date fails to connect to Red Hat Network due to SSL
Certificate Errors, you need to install a version of the
up2date client with an updated certificate. The latest version of
up2date is available from the Red Hat FTP site and may also be
downloaded directly from the RHN website:
https://rhn.redhat.com/help/latest-up2date.pxt
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
71514 - Infinite recursion in SCSI mid layer
77839 - Assert failure in transaction.c:1224: "!jh->b_committed_data
85974 - IDE tape generates errors when execute mt command
90204 - Downgrade assert failure at revoke.c:329 to a warning
90207 - RHEL AS2.1 IPF: Linux scheduler interaction - threads all running on one processor
97065 - Updated cciss driver does not clean up properly after load failiure
98132 - (NET E1000) Taroon Alpha4 e1000 driver does not detect currently being tested NIC/LOM's
99251 - aic7xxx/79xx causes PCI PARITY ERROR on PE4600
101938 - C write fails for records gt 2 GB
102258 - [ibmsis] LTC3905 - RHEL_3 scsi midlayer hang
102400 - LTC3932 - kill10 hangs with RHEL 3 kernel
102535 - hang in ptrace for gdb traceback
103245 - LTC4138 - Vmstat not printing irqs/second
103304 - x86_64 oprofile.o driver misidentifies processor
103491 - NPTL-related invalid uses of thread ID
103671 - More informative memory error reporting on AMD64
104116 - [x86_64] Crash/CPU lockup running lmbench
104172 - GCC testsuite crashing .421 and .411 kernels
104260 - LTC4351 - kernel panic after rmmod'ing and then insmod'ing the olympic token ring module.
104313 - LTC4357 - viocons making > 4k writes
104338 - missing critical HP agp related patches
104520 - SMP Kernel hang on shutdown with Intel SRCZCR Raid Controller
104651 - RHEL 3 U1: Ability to blackl
|